← Back to CVEs
CVE-2026-1467
MEDIUM5.8
Description
A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
CVE Details
CVSS v3.1 Score5.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/27/2026
Last Modified3/25/2026
Sourcenvd
Honeypot Sightings0
Affected Products
gnome:libsoupredhat:enterprise_linux
Weaknesses (CWE)
CWE-93
References
https://access.redhat.com/security/cve/CVE-2026-1467(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2433174(secalert@redhat.com)
https://gitlab.gnome.org/GNOME/libsoup/-/issues/488(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.